PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Share a file Manage my documents Convert Recover PDF Search Help Contact



WTP .pdf



Original filename: WTP.pdf
Title: Slide 1
Author: ben

This PDF 1.5 document has been generated by Microsoft® Office PowerPoint® 2007, and has been sent on pdf-archive.com on 25/10/2013 at 06:13, from IP address 121.243.x.x. The current document download page has been viewed 850 times.
File size: 397 KB (6 pages).
Privacy: public file




Download original PDF file









Document preview


Winter Training Program on Information
Security

OUR OBJECTIVE
India is one of the prime target of every cyber attack, whether
they are websites or networks. Our objective behind the training
program is to educate and spread awareness of such attacks
which would eventually help to secure themselves from such
attacks, and would help the generation choose the career path
as a Security Expert.

WHY INFORMOS TRAINING?
Informos is one of the leading companies in Information Security
Domain. We have certified trainers with experience in
conducting Workshops in India. We have given active support in
the cyber crime investigations, also reported vulnerabilities in
websites.
We create a real time environment which helps students
understand the scenarios well, also helps thinking out-of-the-box.

CONTENTS OF THE COURSE
• Ethics of Hacking







Who are Hackers?
Types and History of Hackers
Ethics of hacking
Importance of Information Security
Career opportunities in Information Security
Conclusion

• Basics of Networks
– Introduction
– Networking Terminologies
Protocols, NAT, Proxy, VPN)
– Various Networking Devices

(

Ports,

IP,

CONTENTS OF THE COURSE
• Basics of Web Technology
– How websites work?
– Basics of HTML
– Basics of PHP

• Information Gathering
– WHOIS Lookup
– Information Gathering through Social
Network/ Search Engines.
– Information Gathering on target website
using tools & scanners.
– Information through Archives.

CONTENTS OF THE COURSE
• Email Attacks & Tracing





Create Fake pages
Spoofing Emails
Tracing Fake mails
Create fake mailers through coding.

• Virus, Worms & Trojans
– WHOI


Related documents


wtp
cyber security
blog of digiosense com
ccna training in cochin
courses
website development


Related keywords